Skip to main content

Advertisement

Log in

Next gen cybersecurity paradigm towards artificial general intelligence: Russian market challenges and future global technological trends

  • Original Paper
  • Published:
Journal of Computer Virology and Hacking Techniques Aims and scope Submit manuscript

Abstract

The growing distribution of large-language models (LLMs) shifts a cybersecurity paradigm. Typical emergent abilities of LLMs, such as in-context learning, instruction following, and step-by-step reasoning, which have not been presented in smaller models, enable LLMs to infer how to perform a new downstream task from a few examples in the context without training, follow the instructions for new tasks without using explicit examples, and solve many complex math tasks and reasoning problems. And one of the effective ways to enhanced the LLMs reasoning ability to solve complex tasks performance is prompt engineering, which allows to develop and optimize prompts for LLMs to return the better solution. Using LLMs for cryptography instead of prescribing specific cryptographic algorithms assumes end-to-end adversarial machine learning based only on a secrecy specification represented by the training objectives; as a result LLMs can learn to use secret keys to protect information from other neural networks, learn how to perform forms of encryption and decryption, and also how to apply these operations in order to meet confidentiality goals. The article deals with the description of the role of LLMs for cybersecurity, along with the knowledge gaps involved in technology, and challenges issues that require detailed consideration for future prospects. At the same time, the authors consider LLMs as a transition stage on the path to artificial general intelligence.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270–299 (1984). https://doi.org/10.1016/0022-0000(84)90070-9

    Article  MathSciNet  MATH  Google Scholar 

  2. Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. CoRR, arXiv:1412.6572 (2014)

  3. Goodfellow, I.J., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A.C., Bengio, Y.: Generative adversarial nets. In Ghahramani, Z., Welling, M., Cortes, C., Lawrence, N.D., Weinberger, K.Q. (Eds.), Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, December 8–13 2014, Montreal, Quebec, Canada, pp. 2672–2680 (2014). http://papers.nips.cc/paper/5423-generative-adversarial-nets

  4. Xie, P., et al.: Crypto-nets: neural networks over encrypted data. arXiv preprint arXiv:1412.6181 (2014)

  5. Gilad-Bachrach, R., et al. Cryptonets: applying neural networks to encrypted data with high throughput and accuracy. In: International Conference on Machine Learning (PMLR) (2016)

  6. Neelakantan, A., Le, Q.V., Sutskever, I.: Neural programmer: Inducing latent programs with gradient descent. CoRR, arXiv:1511.04834 (2015)

  7. Ruttor, A.: Neural Synchronization and Cryptography. PhD thesis, Julius Maximilian University of Wurzburg (2006). http://www.opus-bayern.de/uni-wuerzburg/volltexte/2007/2361/

  8. Klimov, A., Mityagin, A., Shamir, A.: Analysis of neural cryptography. In: Zheng, Y. (Ed.) Advances in Cryptology—ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1–5, 2002, Proceedings, volume 2501 of Lecture Notes in Computer Science, pp. 288–298. Springer, Berlin (2002). https://doi.org/10.1007/3-540-36178-2.18

  9. Deng, G., Liu, Y., Mayoral-Vilches, V., Liu, P., Li, Y., Xu, Y., Zhang, T., Liu, Y., Pinzger, M., Rass, S.: Pentest-gpt: an llm-empowered automatic penetration testing tool. arXiv preprint arXiv:2308.06782 (2023)

  10. Kholgh, D.K., Kostakos, P.: PAC-GPT: a novel approach to generating synthetic network traffic with GPT-3. IEEE Access 11, 114936–114951 (2023). https://doi.org/10.1109/ACCESS.2023.3325727

    Article  MATH  Google Scholar 

  11. Yenduri, G., Ramalingam, M., Chemmalar, S.G., Supriya, Y., Gautam, S., Praveen Kumar Reddy, M., Deepti, R.G., Rutvij, H.J., Prabadevi, B., Wang, W., Vasilakos, A.V., Thippa Reddy, G.: Generative pre-trained transformer: a comprehensive review on enabling technologies, potential applications, emerging challenges, and future directions. CoRR arXiv:2305.10435 (2023)

  12. Luo, H., Luo, J., Vasilakos, A.V.: BC4LLM: trusted artificial intelligence when blockchain meets large language models. CoRR arXiv:2310.06278 (2023)

  13. National Institute of Standards and Technology, U.S. Department of Commerce (NIST), [electronic resource]. https://www.nist.gov/cyberframework/csf-11-archive. Accessed 03/09/2024

  14. The Federal Service for Technical and Export Control (FSTEC of Russia), information security threats databank, [electronic resource], https://bdu.fstec.ru/threat. Accessed 03/09/2024

  15. Information security analytics section, the RF Central Bank [electronic resource]. https://cbr.ru/analytics/ib/operations_survey/2023/. Accessed 03/05/2024

  16. Richardson, J.: Is there a silver bullet to stop cybercrime? Comput. Fraud. Secur. 66, 6–8 (2020)

    Article  MATH  Google Scholar 

  17. Zuev S.V. Geometric properties of quantum entanglement and machine learning. Russian Technological Journal. 11(5):19–33. (2023) https://doi.org/10.32362/2500-316X-2023-11-5-19-33

  18. Chevrot, A., Vernotte, A., Legeard, B.: CAE: contextual auto-encoder for multivariate time-series anomaly detection in air transportation. Comput. Secur. 116, 102652 (2022)

    Article  Google Scholar 

  19. Al-Hashedi, K., Magalingam, P.: Financial fraud detection applying data mining techniques: a comprehensive review from 2009 to 2019. Comput. Sci. Rev. 40, 100402 (2021)

    Article  MATH  Google Scholar 

  20. Feng, W., Liu, Sh., Cheng, X.: EagleMine: vision-guided Micro-clusters recognition and collective anomaly detection. Future Gener. Comput. Syst. 115, 236–250 (2021)

    Article  MATH  Google Scholar 

  21. Shin, S.-Y., Kang, Y.-W., Kim, Y.-G.: Android-GAN: defending against android pattern attacks using multi-modal generative network as anomaly detector. Expert Syst. Appl. 141, 112964 (2020)

    Article  MATH  Google Scholar 

  22. Hilal, W., Gadsden, A., Yawney, J.: Financial fraud: a review of anomaly detection techniques and recent advances. Expert Syst. Appl. 193, 116429 (2022)

    Article  Google Scholar 

  23. Osipov, A., Pleshakova, E., Liu, Y., et al.: Machine learning methods for speech emotion recognition on telecommunication systems. J. Comput. Virol. Hack Technol. (2023). https://doi.org/10.1007/s11416-023-00500-2

    Article  MATH  Google Scholar 

  24. Ivanyuk, V.: Forecasting of digital financial crimes in Russia based on machine learning methods. J. Comput. Virol. Hack Technol. (2023). https://doi.org/10.1007/s11416-023-00480-3

    Article  MATH  Google Scholar 

  25. Boltachev, E.: Potential cyber threats of adversarial attacks on autonomous driving models. J. Comput. Virol. Hack Technol. (2023). https://doi.org/10.1007/s11416-023-00486-x

    Article  MATH  Google Scholar 

  26. Mizinov, P.V., Konnova, N.S., Basarab, M.A., et al.: Parametric study of hand dorsal vein biometric recognition vulnerability to spoofing attacks. J. Comput. Virol. Hack Technol. (2023). https://doi.org/10.1007/s11416-023-00492-z

    Article  Google Scholar 

  27. Bespalova, N., et al.: Development of a network traffic anomaly detection system based on neural networks. In: Samsonovich, A.V., Liu, T. (Eds.) Biologically Inspired Cognitive Architectures 2023 (BICA 2023). Studies in Computational Intelligence, vol. 1130. Springer, Cham (2024). https://doi.org/10.1007/978-3-031-50381-8_13

  28. Efanov, D., Aleksandrov, P., Mironov, I.: Comparison of the effectiveness of cepstral coefficients for Russian speech synthesis detection. J. Comput. Virol. Hack Tech. (2023). https://doi.org/10.1007/s11416-023-00491-0

    Article  MATH  Google Scholar 

  29. Bykov, A., Grecheneva, A., Kuzichkin, O., Surzhik, D., Vasilyev, G., Yerbayev, Y.: Mathematical description and laboratory study of electrophysical methods of localization of geodeformational changes during the control of the railway roadbed. Mathematics 9, 3164 (2021). https://doi.org/10.3390/math9243164

    Article  Google Scholar 

  30. Garin, L., Gisin, V.: Machine learning in classifying bitcoin addresses. J. Finance Data Sci. 9, 100–109 (2023)

    Article  MATH  Google Scholar 

  31. Li, Y., Lyu, S.: Exposing deepfake videos by detecting face warping artifacts. In: CVPR Workshops (2019)

  32. Khayatkhoei, M., Elgammal, A: Spatial frequency bias in convolutional generative adversarial networks. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 36, pp. 7152–7159 (2022)

  33. Dzanic, T., Shah, K., Witherden, F.D.: Fourier spectrum discrepancies in deep network generated images. In: Proceedings of the 34th International Conference on Neural Information Processing Systems, pp. 3022–3032 (2020)

  34. Qian, Y., Yin, G., Sheng, L., Chen, Z., Shao, J.: Thinking in frequency: face forgery detection by mining frequency-aware clues. In: European Conference on Computer Vision, pp. 86–103 (2020)

  35. Zhao, H., Zhou, W., Chen, D., Wei, T., Zhang, W., Yu, N.: Multi-attentional deepfake detection. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 2185–2194 (2021)

  36. Sebyakin, A., Soloviev, V., Zolotaryuk, A.: Spatio-temporal deepfake detection with deep neural networks. In: International Conference on Information, pp. 78–94 (2021)

  37. Guo, H., Hu, S., Wang, X., Chang, M.-C., Lyu, S.: Eyes tell all: Irregular pupil shapes reveal gan-generated faces. In: ICASSP 2022—2022 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP), pp. 2904–2908 (2022)

  38. Le, B.M., Woo, S.S.: Quality-agnostic deepfake detection with intra-model collaborative learning. In: 2023 IEEE/CVF International Conference on Computer Vision (ICCV), Paris, France, pp. 22321–22332 (2023). https://doi.org/10.1109/ICCV51070.2023.02045

Download references

Funding

This research was funded by the Ministry of Science and Higher Education of the Russian Federation grant no. 075-15-2024-525.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ekaterina Pleshakova.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pleshakova, E., Osipov, A., Gataullin, S. et al. Next gen cybersecurity paradigm towards artificial general intelligence: Russian market challenges and future global technological trends. J Comput Virol Hack Tech 20, 429–440 (2024). https://doi.org/10.1007/s11416-024-00529-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-024-00529-x

Keywords

Navigation